rottytooth / rot8000
rot13 for the Unicode generation
☆126Updated 2 years ago
Alternatives and similar repositories for rot8000:
Users that are interested in rot8000 are comparing it to the libraries listed below
- What is hip? Tell me, tell me (if you think you know)☆110Updated 6 years ago
- this URL is also malicious(?!) shell script☆143Updated 3 weeks ago
- com2txt tool (from 1993)☆30Updated 7 years ago
- ssh register@ui.baxx.dev [shutdown due to covid-19]☆136Updated 4 years ago
- PUREE: Password-based Uniform-Random-Equivalent Encryption☆63Updated 4 years ago
- ☆67Updated 4 years ago
- abuse ImageMagick (or GraphicsMagick) to create arbitrary files☆53Updated 3 weeks ago
- A BSD authentication module for duress passwords☆109Updated 6 months ago
- file history with ed(1), diff(1), awk(1), sed(1) and sh(1)☆108Updated 4 years ago
- What if you could use bash from a filesystem?☆64Updated 5 years ago
- Highlight and tag your friends on Hacker News☆48Updated last year
- GNUplot with sixel support☆99Updated 5 years ago
- A dog collar that converts barks to emails.☆56Updated 5 years ago
- Make a disk image formatted with both ext2 and FAT at once☆382Updated last year
- lol☆14Updated last year
- OpenTTD but with a prometheus metrics endpoint☆28Updated 4 years ago
- Chrome extension designed to help automate the signup to Yahoo Groups☆82Updated 4 years ago
- Unsong for kindle, based on https://github.com/rhelsing/worm_scraper☆62Updated 7 years ago
- Git repository with a commit for every single shorthash☆205Updated 3 years ago
- SSL without a certificate authority☆31Updated 6 years ago
- Find the safest well lit walking path between two locations on earth.☆124Updated 2 years ago
- Ansible playbook for lobste.rs☆85Updated 2 months ago
- 855-MEOW-JAM☆70Updated 6 years ago
- vastly-improved Hugo-fied version of my blog☆11Updated 2 years ago
- Codename generator using WordNet parts of speech database☆27Updated 3 years ago
- markov chains in ~20 lines of sh, grep, cut and awk☆55Updated 5 years ago
- ☆44Updated 2 years ago
- Browse Hacker News in Gopherspace☆85Updated 3 years ago
- Secure storage for cryptographic secrets, modeled after sudo☆78Updated 5 years ago
- An implementation of rule 110 in Scalable Vector Graphics☆147Updated 4 years ago